Cost: Members: $95
Non-Members: $195
Registration Includes: One telephone and web connection at one physical location
US: 3:00pm – 4:00pm ET
The second webinar in our cybersecurity series will focus on ransomware groups. Join Atlantic Data Forensics’ Trish Dixon as she shares a brief overview of current ransomware groups and the tactics and techniques that are commonly used.
Recognizing these techniques and securing your home and business could save millions. Trish will share stories and insights into how the most active ransomware groups are infiltrating companies large and small and what you can do to ensure that you are doing your part to keep your company safe.
Trisha Dixon, Vice President, Cybersecurity Services, Atlantic Data Forensics
Trisha Dixon has more than 26 years of experience in security, cyber operations, threat intelligence and leadership. She is responsible for expanding the services such as incident response and business continuity training offered by Atlantic Data Forensics, a specialized services company that provides digital forensics, e-discovery, expert witness and cybercrime services to corporate and government clients.
Prior, Trisha served as vice present of the cyber operations center at IronNet Cybersecurity Inc. in Fulton, MD. She designed and built out a robust security operations center with teams dedicated to conducting fusion of threat intelligence, implementation of mitigation efforts and analysis of cyber events across company and client networks. Her team provided oversight of the company’s critical infrastructure and implemented security controls and policies, which led to certifications in ISO27001/SOC2, GDPR and FedRAMP. She structured a services aspect to security operations, which provided customer training and threat hunting across their networks.
Trisha retired from the U.S. Navy as a Chief Warrant Officer 3. With more than 21 years as a cryptologist, she served as a technical advisor, senior signals and collection analyst, acquisition specialist, policy review and oversight specialist, and manager of interactive cyber operations within a distributed operations network worldwide.
Instructions to join the Webinar will be sent to the main registrant's email address the day before. Remember! please log-in at least 15 minutes prior to the webinar commencing to ensure ample time for technical assistance if needed.